Page MenuHomeVyOS Platform

Incorrect configuration logic for IPsec in VPP
Closed, ResolvedPublicBUG

Description

Currently, there are two conditions in the configuration templates:

The idea is to enable IPsec offload only if it is configured in the CLI. However, this does not work as intended because the linux-cp plugin copies SAs and policies from the kernel even if the feature is not configured. What actually happens is:

  • without enable-route-mode-ipsec config, the default policy-based mode is used by linux-cp
  • SAs and policies are installed into VPP
  • Policy-based IPsec does not work, and traffic cannot pass through the router properly

We need to add an option to linux-cp that will allow us to enable/disable IPsec offload in a proper way (probably, by ignoring netlink XFRM messages).

I don't think we need to enable/disable this dynamically - the ability to control this from the VPP configuration file should be sufficient. This approach would also eliminate the need for a graceful shutdown after the switch from on to off.

Details

Version
2025.09.01-0023-rolling
Is it a breaking change?
Perfectly compatible
Issue type
Bug (incorrect behavior)

Related Objects

Event Timeline

zsdc updated the task description. (Show Details)
Viacheslav assigned this task to denys.haryachyy.
Viacheslav moved this task from Need Triage to Completed on the VyOS Rolling board.
dmbaturin changed Is it a breaking change? from Unspecified (possibly destroys the router) to Perfectly compatible.